Pearson+

Security in Computing, 6th edition

  • Lizzie Coles-Kemp
  • , Charles Pfleeger
  • , Shari Lawrence Pfleeger
loading

  • Find it fast
    Find it fast

    Quickly navigate your eTextbook with search

  • Stay organized
    Stay organized

    Access all your eTextbooks in one place

  • Easily continue access
    Easily continue access

    Keep learning with auto-renew

The New State of the Art in Information Security: From Cloud to Crypto, AI-Driven Security to Post-Quantum Computing

Now extensively updated throughout, Security in Computing, Sixth Edition, is today's one-stop, primary text for everyone teaching, learning, and practicing information cybersecurity. It defines core principles associated with modern security policies, processes, and protection; illustrates them with up-to-date sidebars and examples; and shows how to apply them in practice. Modular and flexibly organized, it supports a wide array of courses, strengthens professionals' knowledge of foundational principles; and imparts a more expansive understanding of modern security.

This edition adds or expands coverage of artificial intelligence and machine learning tools; app and browser security; security by design; securing cloud, IoT, and embedded systems; privacy-enhancing technologies; protecting vulnerable individuals and groups; strengthening security culture; cryptocurrencies and blockchain; offensive cyberwarfare; post-quantum computing; and more. It contains many new diagrams, exercises, sidebars, and examples, and is mapped to two leading frameworks: the US NIST National Initiative for Cybersecurity Education (NICE) and the UK Cyber Body of Knowledge (CyBOK).

  • Core security concepts: Assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, attackers, and attack types
  • The security practitioner's toolbox: Identification, authentication, access control, and encryption
  • Areas of practice: Securing programs, user–internet interaction, operating systems, networks, data, databases, and cloud computing
  • Cross-cutting disciplines: Privacy, management, law, and ethics
  • Using cryptography: Solve real problems, and explore its formal and mathematical underpinnings
  • Emerging topics and risks: AI and adaptive cybersecurity, blockchains and cryptocurrencies, computer-assisted offensive warfare, and quantum computing

Published by Addison-Wesley Professional (November 30th 2023) - Copyright © 2024

ISBN-13: 9780138230746

Subject: Networking & Security

Category: Computer Security